Search Results - "Koay, Abigail"
-
1
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
Published in Journal of intelligent information systems (01-04-2023)“…The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems and processes, particularly on Industrial Control Systems (ICS)…”
Get full text
Journal Article -
2
Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network
Published in IEEE access (2018)“…Extensive adoption of intelligent devices with ubiquitous connectivity has increased Internet of Things (IoT) traffic tremendously. The smart devices promise…”
Get full text
Journal Article -
3
Benchmarking and learning garbage collection delays for resource‐restricted graphical user interfaces
Published in Software, practice & experience (01-01-2022)“…Tablets, smartphones, and wearables have limited resources. Applications on these devices employ a graphical user interface (GUI) for interaction with users…”
Get full text
Journal Article -
4
Comparison Of Pretrained Feature Extractors For Glaucoma Detection
Published in 2021 IEEE 18th International Symposium on Biomedical Imaging (ISBI) (13-04-2021)“…Glaucoma identification is often performed manually by medical professionals, which is time consuming. Automated image analysis (e.g. of retinal fundus images)…”
Get full text
Conference Proceeding -
5
Embedding Java Classes with code2vec: Improvements from Variable Obfuscation
Published in 2020 IEEE/ACM 17th International Conference on Mining Software Repositories (MSR) (01-05-2020)“…Automatic source code analysis in key areas of software engineering, such as code security, can benefit from Machine Learning (ML). However, many standard ML…”
Get full text
Conference Proceeding -
6
A new multi classifier system using entropy-based features in DDoS attack detection
Published in 2018 International Conference on Information Networking (ICOIN) (01-01-2018)“…Entropy-based features have been widely utilized for detecting DDoS attacks in recent years. However, existing approaches mainly focus on using a small number…”
Get full text
Conference Proceeding -
7
Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization
Published 16-10-2022“…The need to learn from positive and unlabeled data, or PU learning, arises in many applications and has attracted increasing interest. While random forests are…”
Get full text
Journal Article -
8
Maintaining SLOs of Cloud-Native Applications Via Self-Adaptive Resource Sharing
Published in 2019 IEEE 13th International Conference on Self-Adaptive and Self-Organizing Systems (SASO) (01-06-2019)“…With changing workloads, cloud service providers can leverage vertical container scaling (adding/removing resources) so that Service Level Objective (SLO)…”
Get full text
Conference Proceeding -
9
Embedding Java Classes with code2vec: Improvements from Variable Obfuscation
Published 06-04-2020“…Automatic source code analysis in key areas of software engineering, such as code security, can benefit from Machine Learning (ML). However, many standard ML…”
Get full text
Journal Article -
10
Plan2Defend: AI Planning for Cybersecurity in Smart Grids
Published in 2021 IEEE PES Innovative Smart Grid Technologies - Asia (ISGT Asia) (05-12-2021)“…AI Planning (or Automated Planning) is a sub-field within AI which has been applied to several information security sub-fields, particularly vulnerability…”
Get full text
Conference Proceeding